Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
Download
29547 views
1
2
3
4
5
6
7
8
9
Address your e-mail to
10
the editors to [email protected].
11
12
13
14
"The
15
Name's Bond. Gomer Bond."
16
17
18
Arrogance and ignorance
19
underpin Edward Luttwak's "The CIA Is Déclassé." Today the agency looks beyond Central and
20
Western Europe, and their "targets" hail from around the globe. While the CIA
21
Bubba may prefer a cold Bud and softball over a weekend of Bondian play in St.
22
Moritz, I defy Luttwak to demonstrate how the U.S. government can reliably use
23
such experiences as winter holidays on Europe's slopes as screens for future
24
success in gathering information on dangers such as nuclear- or
25
chemical-proliferation threats in the Middle East or East Asia. Leave charming
26
the local intelligentsia to diplomats.
27
28
Spare us laments about the
29
decline of Ivy League credentialism in government service. We have the world's
30
broadest-based system of higher education, and those state-college alumni work
31
at the CIA because they are smart and well educated.
32
33
Young
34
caffeine- and liquor-free Mormons just happen to be--because of their church's
35
missionary zeal--one of this country's richest veins of talent with foreign
36
experience and skill in languages. Odd as it may sound, the average Brigham
37
Young University graduate probably knows a lot more about the world than his
38
counterpart at Georgetown or Princeton. As for the CIA's personnel problems,
39
they seem to stem more from lack of accountability than from the basic nature
40
of the agents.
41
42
43
--Kevin Michael
44
O'Reilly
45
46
47
48
Party
49
Hack
50
51
52
"Hack Attacks," by Bill
53
Barnes, was uncomfortably close to the Microsoft party line.
54
55
I was particularly bothered
56
by a subtle attack on Java as vs. ActiveX. The article says several times that
57
the Java approach is "slower." It later says that Java is unsuitable for
58
high-performance video games because of Java's slowness. This is deceptive.
59
Technology has been commercially demonstrated that runs Java programs at very
60
high speed (e.g., Asymmetrix). It simply isn't linked up to Internet Explorer
61
and Netscape Navigator/Communicator yet. The Java byte-code verifier imposes
62
some performance cost, but there's no reason Java code cannot be byte-code
63
verified once, then translated to efficient machine code, and then stored on
64
your hard drive along with all your store-bought applications.
65
66
The security approach of Java
67
does restrict what an unsigned applet can do, and those criticisms are fair.
68
But the criticism of Java on performance grounds, as if the performance
69
problems were inherent in the security model, is not fair and is not
70
accurate.
71
72
And because the question of
73
Java vs. ActiveX is a very hot topic in the industry now, with lots of money
74
riding on it, it's impossible not to wonder whether Microsoft's influence on
75
Slate had something to do with this unfairness.
76
77
Of course
78
I don't believe Bill Gates ordered you to slander Java! But Barnes presumably
79
hangs around with a lot more Microsoft people than JavaSoft people, and is
80
likely to absorb their point of view, as I'm sure I would in the same
81
circumstances. The ultimate effect is that this article treads close to the
82
danger zone.
83
84
85
--Dan Weinreb
86
87
88
89
Bill Barnes
90
replies: You're right, of course, that I tend to understand the Microsoft
91
view more clearly, just as you obviously do the JavaSoft view. As with any
92
religious war, no one is neutral except the atheists. Java is a great and very
93
useful language, but all the upcoming performance-improvement technologies in
94
the world won't help the people using today's browsers, as you yourself admit.
95
Therefore I stand by the caveats I described.
96
97
98
Key
99
Points
100
101
102
"Hack Attacks," by Bill
103
Barnes, was generally excellent, but I have a few criticisms.
104
105
Secret-key cryptography
106
("single-key," in Barnes' terminology) is not bad for two-way interactions. In
107
fact, it's routinely used for that purpose. But it's difficult to get the
108
shared secret key to the other person (or people) in the first place.
109
Public-key key exchange gets the secret key to its destination safely, avoiding
110
the chicken-and-egg problem of having to share a secret key already in order to
111
share another key secretly. Afterward, secret-key cryptography is normally used
112
for efficiency reasons.
113
114
The reduced version of a
115
long document is known as a "digest," not a signature. It is a widely held but
116
mistaken belief that a digital signature is the public-key
117
decryption/private-key encryption of a document's digest. That's how RSA, the
118
most popular signature algorithm, works, because it happens to be both a
119
signature algorithm and a public-key encryption algorithm.
120
121
Barnes also might have
122
mentioned one solution to the problem of the corruptible system administrator:
123
"secret sharing." It is possible to divide up secrets (such as passwords) among
124
several people such that only a subset of them of a certain size (a majority,
125
for instance) can recover the original. That way, a single corrupt authority
126
can't hurt you.
127
128
The last
129
part of the article might have underplayed the security threats to users. It's
130
true that nothing serious has really happened yet, but very little of value (to
131
a hacker) is in people's computers these days. That may change fast; if desktop
132
banking (including check writing) becomes widespread, for example, then the
133
incentive for hackers to use their discoveries for something other than
134
embarrassing Microsoft or causing general mischief increases dramatically.
135
136
-- Dan Simon
137
138
139
140
Bill Barnes
141
replies: Dan Simon's technical nits are well taken. However, while I agree
142
that security is a serious issue, I reiterate that the hysterics with which
143
security stories are played out in the media are generally overblown.
144
145
146
Breaking
147
the Waves
148
149
150
I enjoyed the Committee of
151
Correspondence discussion "Cycles, Waves, and Endings in History," and I agree with those who
152
say that the generational conflict is driving electoral politics and
153
policy-making. Someone should interpret moves like cutting welfare as yet
154
another symptom of baby boom me-firstism.
155
156
And while
157
I agree with Francis Fukuyama's optimism for democracy, it's important to note
158
that anti-democratic movements have gained new strength in recent years in the
159
United States and Western Europe, and in some cases have gained power through
160
the same systems they want to destroy. The future of democracy through
161
technological change is anything but assured. Postindustrial, extreme-right
162
movements know where to find the Web, too.
163
164
-- Mark Hunter
165
166
167
168
Is That
169
a D Cup You're Wearing, or Are You Just Glad to See Me?
170
171
172
"Bra Story,"
173
by Anne Hollander, was a great contribution to the recent surge in chronicling
174
the history of the unleashing of the female form in the 20 th
175
century. Her appreciation of the em-bra'd breast manages to be both appropriate
176
and evocative, if not titillating.
177
178
It may be some years more
179
before the male version of this trend plays itself out thoroughly enough to
180
merit similar discussion. Some future male Madonna appearing onstage in his
181
bullet jock will signal the pinnacle, I suppose. But the past decades have
182
already seen the liberation of the family jewels.
183
184
The heterosexual world has
185
embraced gay iconic sexuality consistently at a lag of five years or so. From
186
1950s fitness magazines to Batman's crotch bulge in the '60s, the International
187
Male catalog in the '70s, GQ in the early '80s, and Marky Mark in his
188
Calvins a few years ago, the penis has gone from unspeakable to unavoidable.
189
And just take a look at the current Jockey underwear packaging if you need to
190
confirm that circumcision is still being practiced in North America.
191
192
The
193
sociological implications are huge. Penis envy is spreading. And surely there's
194
a link between naked men on billboards, hard-core porn in the home video
195
library, and anything that can be attributed to largely male decision
196
makers--from corporate mergers to the end of the Cold War.
197
198
-- Robert
199
Rothery
200
201
202
203
The Odds
204
on God
205
206
207
Benjamin Wittes' article
208
"Cracking God's
209
Code" must have been intended for April Fool's Day. Wittes apparently
210
believes that the discovery of statistically unlikely "secret codes" in the
211
Torah proves the existence of God. Even if we accept the dubious premise that
212
the existence of God can be proven scientifically, it is extremely naive to say
213
that the occurrence of an unlikely event would do the trick.
214
215
I don't
216
know which is more depressing: the fact that some people's faith is so weak
217
they seek scientific approval of their beliefs, or the fact that they believe a
218
supposedly all-knowing, all-powerful God would choose to reveal himself through
219
some inconsequential abnormality.
220
221
-- Mike Bohan
222
223
224
225
Criminal
226
Procedures
227
228
229
Alan Dershowitz argues in a
230
recent book review titled "Crime and Truth" that powerful procedural safeguards for
231
defendants allow some guilty people to go free, but that these procedures are
232
justified to prevent miscarriages of justice and to deter misconduct among
233
police.
234
235
He misses three essential
236
points. First, these rules harden public attitudes toward everyone accused of a
237
crime. Second, they feed into the corrosive cynicism within the justice system.
238
Since procedural niceties seem arbitrary and irrelevant to fact-finding, there
239
is little motivation to enforce the rules, and people often find ways of
240
bending rules that they regard as arbitrary and silly. For example, as
241
Dershowitz himself has written, judges pretend to believe police who lie about
242
illegal searches.
243
244
Third,
245
the most glaring injustice these days is not the wrongful conviction of the
246
innocent. It is the remarkably cruel treatment of some people who are actually
247
guilty. When a troubled and illiterate 19-year-old can receive life
248
imprisonment for committing three muggings, it seems laughably irrelevant to
249
focus on courtroom procedures.
250
251
-- Harold
252
Pollack
253
254
255
256
257
Sleepers
258
259
260
As the
261
father of two adopted boys (12 and 11 months), I enjoyed reading Robert
262
Wright's article "Go Ahead--Sleep With Your Kids." I urge him to get back in touch
263
and tell us if he winds up with a 10-year-old and a 7-year-old in bed with him
264
(now, that's what I call birth control).
265
266
-- Brian Murphy
267
268
269
270
Address
271
your e-mail to the editors to [email protected].
272
273
274
275
276
277
278